[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.132' (ECDSA) to the list of known hosts. 2020/11/24 09:56:47 fuzzer started 2020/11/24 09:56:48 dialing manager at 10.128.0.105:43291 2020/11/24 09:56:48 syscalls: 3293 2020/11/24 09:56:48 code coverage: enabled 2020/11/24 09:56:48 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/11/24 09:56:48 extra coverage: extra coverage is not supported by the kernel 2020/11/24 09:56:48 setuid sandbox: enabled 2020/11/24 09:56:48 namespace sandbox: enabled 2020/11/24 09:56:48 Android sandbox: /sys/fs/selinux/policy does not exist 2020/11/24 09:56:48 fault injection: enabled 2020/11/24 09:56:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/11/24 09:56:48 net packet injection: enabled 2020/11/24 09:56:48 net device setup: enabled 2020/11/24 09:56:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/11/24 09:56:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/11/24 09:56:48 USB emulation: /dev/raw-gadget does not exist 2020/11/24 09:56:48 hci packet injection: enabled 2020/11/24 09:56:48 wifi device emulation: enabled 09:58:25 executing program 0: mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) 09:58:25 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet(0x2, 0x800, 0x6) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000580)) write$binfmt_aout(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) r3 = socket(0x8, 0x2, 0xef0d) r4 = accept4(r3, &(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x80, 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x0, @nfc={0x27, 0x0, 0x0, 0x1}, @l2={0x1f, 0x4, @none, 0x5}, @xdp={0x2c, 0x1, 0x0, 0x3e}, 0x4, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)='veth0_virt_wifi\x00', 0x66, 0x400, 0xfff8}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000001c0)={'erspan0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="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"]}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'gretap0\x00', r7, 0x40, 0x40, 0x4, 0x1f, {{0x16, 0x4, 0x0, 0x7, 0x58, 0x64, 0x0, 0xf2, 0x4, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0xa}, {[@timestamp_prespec={0x44, 0x44, 0x87, 0x3, 0xe, [{@local, 0xffff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@multicast2, 0x2}, {@loopback, 0x10001}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x5}, {@local, 0x80000001}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x3ff}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x2}]}]}}}}}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, @can={0x1d, r7}, @nl=@proc={0x10, 0x0, 0x25dfdbfb}, 0x94, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='bridge0\x00', 0x20, 0x2, 0x8c61}) 09:58:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000100)={'ipvlan1\x00', @ifru_flags}) 09:58:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000040)={'veth0_virt_wifi\x00', @ifru_flags}) 09:58:25 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 09:58:25 executing program 4: r0 = mq_open(&(0x7f0000000040)='!\']\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/107, 0x6b, 0x0, &(0x7f0000000140)) syzkaller login: [ 128.350651] IPVS: ftp: loaded support on port[0] = 21 [ 128.429518] IPVS: ftp: loaded support on port[0] = 21 [ 128.528029] chnl_net:caif_netlink_parms(): no params data found [ 128.564419] IPVS: ftp: loaded support on port[0] = 21 [ 128.659508] IPVS: ftp: loaded support on port[0] = 21 [ 128.721497] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.728563] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.736624] device bridge_slave_0 entered promiscuous mode [ 128.743281] chnl_net:caif_netlink_parms(): no params data found [ 128.794842] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.801992] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.811912] device bridge_slave_1 entered promiscuous mode [ 128.842830] chnl_net:caif_netlink_parms(): no params data found [ 128.876323] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 128.901143] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 128.935229] IPVS: ftp: loaded support on port[0] = 21 [ 128.948461] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 128.956651] team0: Port device team_slave_0 added [ 128.981964] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 128.990157] team0: Port device team_slave_1 added [ 129.104302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.112578] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.138545] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.150295] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.157411] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.164276] device bridge_slave_0 entered promiscuous mode [ 129.173441] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.181571] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.188934] device bridge_slave_1 entered promiscuous mode [ 129.195087] chnl_net:caif_netlink_parms(): no params data found [ 129.204362] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.210787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.236318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.250445] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.273626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 129.310135] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 129.319419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 129.320088] IPVS: ftp: loaded support on port[0] = 21 [ 129.337890] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.344268] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.354977] device bridge_slave_0 entered promiscuous mode [ 129.378798] device hsr_slave_0 entered promiscuous mode [ 129.384427] device hsr_slave_1 entered promiscuous mode [ 129.402184] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.411421] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.419361] device bridge_slave_1 entered promiscuous mode [ 129.425856] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 129.433456] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 129.442268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 129.449453] team0: Port device team_slave_0 added [ 129.461639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 129.468976] team0: Port device team_slave_1 added [ 129.537989] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 129.546956] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.553465] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.579697] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.609409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 129.625754] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.632905] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.659206] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.697188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.715014] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 129.722486] team0: Port device team_slave_0 added [ 129.735356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 129.773108] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 129.780903] team0: Port device team_slave_1 added [ 129.786411] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.792793] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.801508] device bridge_slave_0 entered promiscuous mode [ 129.853723] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.860218] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.868728] device bridge_slave_1 entered promiscuous mode [ 129.912375] device hsr_slave_0 entered promiscuous mode [ 129.918362] device hsr_slave_1 entered promiscuous mode [ 129.938777] chnl_net:caif_netlink_parms(): no params data found [ 129.950295] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.956779] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.982927] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 130.001131] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.008406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.025839] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 130.032269] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.058080] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.069858] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.080967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 130.108476] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 130.174640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 130.236040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 130.243881] team0: Port device team_slave_0 added [ 130.273875] device hsr_slave_0 entered promiscuous mode [ 130.280386] device hsr_slave_1 entered promiscuous mode [ 130.286422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 130.293672] team0: Port device team_slave_1 added [ 130.308626] chnl_net:caif_netlink_parms(): no params data found [ 130.329618] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.338952] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.360569] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 130.367576] Bluetooth: hci4 command 0x0409 tx timeout [ 130.372945] Bluetooth: hci1 command 0x0409 tx timeout [ 130.373039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.378940] Bluetooth: hci0 command 0x0409 tx timeout [ 130.405528] Bluetooth: hci2 command 0x0409 tx timeout [ 130.414683] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 130.420165] Bluetooth: hci5 command 0x0409 tx timeout [ 130.431077] Bluetooth: hci3 command 0x0409 tx timeout [ 130.458902] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 130.465173] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.490585] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.521612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 130.529995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 130.539310] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 130.601895] device hsr_slave_0 entered promiscuous mode [ 130.608093] device hsr_slave_1 entered promiscuous mode [ 130.614793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.631377] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.637852] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.645092] device bridge_slave_0 entered promiscuous mode [ 130.663403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.679351] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.685748] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.693349] device bridge_slave_1 entered promiscuous mode [ 130.732340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.741821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 130.791305] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 130.800556] team0: Port device team_slave_0 added [ 130.832149] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 130.852596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 130.860654] team0: Port device team_slave_1 added [ 130.865693] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.873234] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.880590] device bridge_slave_0 entered promiscuous mode [ 130.920962] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.927788] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.934686] device bridge_slave_1 entered promiscuous mode [ 130.993131] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 130.999500] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 131.025875] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 131.041541] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 131.047840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 131.073994] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 131.084919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.123910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.131691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.149867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.161895] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.171513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.195685] device hsr_slave_0 entered promiscuous mode [ 131.201601] device hsr_slave_1 entered promiscuous mode [ 131.209001] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.225617] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.233953] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.243943] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 131.261716] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.269167] team0: Port device team_slave_0 added [ 131.277013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.284467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.297120] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 131.303219] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.310535] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 131.318119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.325413] team0: Port device team_slave_1 added [ 131.342370] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.351672] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 131.358165] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.384205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.391579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.403680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 131.413307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 131.423105] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.430995] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 131.438241] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 131.464549] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 131.476426] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 131.482662] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 131.508221] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 131.520583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.528714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.538821] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.545229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.552399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.561686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.569433] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.575785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.585451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 131.601811] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.609644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.618341] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.627970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.635007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.642233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.650475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.659063] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.665406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.675261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 131.698533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 131.708627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 131.715609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.725584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.733502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.741580] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.747981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.755099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.766734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 131.777661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 131.802088] device hsr_slave_0 entered promiscuous mode [ 131.808162] device hsr_slave_1 entered promiscuous mode [ 131.825215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.832966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.841515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.855504] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 131.863278] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 131.881621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 131.888725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.895846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.904531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.923262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 131.943146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.991238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 132.014670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.028410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.036012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.045046] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 132.068661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.080631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.088827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.097293] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.105063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 132.126839] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 132.133882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 132.145697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.156854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.164177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.171251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.178231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.185775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.210187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.223242] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.231321] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 132.238152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.251426] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 132.261703] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.269892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 132.284531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 132.293336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.301287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.308971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.316874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.325743] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 132.336820] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 132.342888] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.350571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 132.361025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 132.370897] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 132.377329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.386862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.393755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.401608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.409697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.417638] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.423963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.431495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.439634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.447837] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.454189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.456396] Bluetooth: hci3 command 0x041b tx timeout [ 132.462883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.473586] Bluetooth: hci0 command 0x041b tx timeout [ 132.473942] Bluetooth: hci5 command 0x041b tx timeout [ 132.479734] Bluetooth: hci1 command 0x041b tx timeout [ 132.489916] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.496485] Bluetooth: hci2 command 0x041b tx timeout [ 132.501741] Bluetooth: hci4 command 0x041b tx timeout [ 132.503649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 132.524891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.533421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.541251] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.547681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.558662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 132.568542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 132.576990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 132.589162] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 132.596922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.604086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.613013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.621392] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.627805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.635041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.642957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.653882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 132.662015] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 132.670252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 132.679636] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.688592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 132.705651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.715555] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.722431] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.730134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.740534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 132.748251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 132.773936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 132.781163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.790435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.799013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.805705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.813131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.821169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.838371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 132.845215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.852937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.860812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.869972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.879899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 132.891304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.901721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.911923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.919922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.933499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.944100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 132.953147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 132.963978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 132.981136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.989014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.998481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.009384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.017305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.024969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.036343] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 133.045219] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.054348] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 133.060897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.070995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.079337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.089210] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.095283] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.107600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.117167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.126578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 133.136955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.145467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.159712] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 133.165736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.178106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.191267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.198721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.214938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.223113] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.229607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.239239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.246637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.254057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.263497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 133.272048] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 133.281388] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.287839] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.300802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.313320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.322382] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.328797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.339504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.348010] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 133.357456] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 133.367892] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 133.380263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.389997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.400751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.411825] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 133.420003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.429070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.439581] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 133.448881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.455869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.468623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.475374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.485122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.493418] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.499814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.507496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.515898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.525527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 133.538046] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 133.546895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.559883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.572327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.581773] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.588187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.595250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.603421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.611408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.619276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.630853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.639322] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 133.652553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.660890] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.673198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.682636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.696712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.704789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.716046] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.727544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.735119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.745403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.761140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.770872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.792548] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 133.802134] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 133.809571] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 133.815707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.823779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.831351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.839202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.847463] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.857187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.865391] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.877951] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 133.883994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.904533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.920868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.930626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.943358] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 133.954283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.963112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.975157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.983308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.990924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.998366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.005868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.014007] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.021077] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.033147] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 134.044227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 134.053935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.064481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.075345] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 134.084196] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 134.092773] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 134.099921] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 134.111872] device veth0_vlan entered promiscuous mode [ 134.119912] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.130145] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 134.139436] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.145499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.158365] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 134.165478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.172506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.181128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.189142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.197509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.204757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.219712] device veth1_vlan entered promiscuous mode [ 134.225738] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 134.235176] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 134.244581] device veth0_vlan entered promiscuous mode [ 134.257772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.264180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 134.273362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.280905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.291228] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 134.309625] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 134.317739] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 134.332851] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.342948] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.351760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.360467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.371911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.379179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.388722] device veth1_vlan entered promiscuous mode [ 134.394750] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 134.406033] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 134.427347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.437209] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 134.454041] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 134.462572] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 134.472996] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.484520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.493042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.503134] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 134.511456] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 134.518260] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 134.526466] Bluetooth: hci4 command 0x040f tx timeout [ 134.528948] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 134.531928] Bluetooth: hci2 command 0x040f tx timeout [ 134.538749] Bluetooth: hci5 command 0x040f tx timeout [ 134.544466] Bluetooth: hci3 command 0x040f tx timeout [ 134.557865] device veth0_macvtap entered promiscuous mode [ 134.564129] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 134.575238] Bluetooth: hci1 command 0x040f tx timeout [ 134.579729] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 134.581846] Bluetooth: hci0 command 0x040f tx timeout [ 134.592354] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 134.599408] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 134.611932] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 134.626607] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 134.635315] device veth0_macvtap entered promiscuous mode [ 134.646815] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 134.655233] device veth1_macvtap entered promiscuous mode [ 134.662459] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 134.674004] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 134.682045] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.690730] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.698218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.705547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.713309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.721363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.729143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.736946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.744701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.751795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.759095] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.767928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.774858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.783793] device veth0_vlan entered promiscuous mode [ 134.792400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 134.804816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 134.814905] device veth0_vlan entered promiscuous mode [ 134.826776] device veth1_macvtap entered promiscuous mode [ 134.843366] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 134.852939] device veth1_vlan entered promiscuous mode [ 134.865505] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 134.873791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.920916] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 134.929918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.938935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.950056] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 134.964960] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 134.975797] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 134.983006] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.992787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 135.004326] device veth1_vlan entered promiscuous mode [ 135.014785] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 135.022594] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.031848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.040840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.049388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.065145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.075923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.089301] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 135.096381] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.107339] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 135.115703] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.124419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.133183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.143527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.162031] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 135.172615] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 135.182509] device veth0_macvtap entered promiscuous mode [ 135.190798] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 135.199988] device veth1_macvtap entered promiscuous mode [ 135.212066] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 135.219537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.229893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.239867] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 135.247335] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.254695] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 135.262371] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.269560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.277720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.285547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.293489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.313732] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 135.325409] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 135.341799] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 135.349468] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 135.365843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 135.373565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.383789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.401769] device veth0_macvtap entered promiscuous mode [ 135.408866] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 135.418512] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 135.431278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 135.441595] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 135.450817] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 135.459060] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 135.465242] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 135.473533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.481399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.492117] device veth1_macvtap entered promiscuous mode [ 135.499362] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 135.509528] device veth0_vlan entered promiscuous mode [ 135.519384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.535568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.546929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.556702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.567419] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 135.574336] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.583782] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 135.590978] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.598513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.605337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.612650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.620588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.628710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.635986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.646716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 135.655627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.666466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.675608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.689772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.701814] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 135.709743] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.721021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 135.732081] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.739837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.747135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.754761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.765396] device veth1_vlan entered promiscuous mode [ 135.774621] device veth0_vlan entered promiscuous mode [ 135.799666] device veth1_vlan entered promiscuous mode [ 135.815878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.830885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.840166] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.851231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.861012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.872173] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.882606] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 135.890574] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.917434] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 135.924656] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.935282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.951653] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.962474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.973236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.984263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.993517] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.003592] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.013810] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 136.021083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 136.032309] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 136.043628] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 136.057773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.065641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.083156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.091513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.125099] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 136.134150] device veth0_macvtap entered promiscuous mode [ 136.147857] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 136.170654] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 136.182053] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 136.190595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.199042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.208935] device veth0_macvtap entered promiscuous mode [ 136.215206] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 136.224620] device veth1_macvtap entered promiscuous mode [ 136.231629] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 136.239056] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.268269] device veth1_macvtap entered promiscuous mode [ 136.274548] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 136.281674] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.308256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 136.354761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.364738] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 136.373727] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.381467] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 136.409561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 136.429514] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 136.437394] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 136.437431] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.459481] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.468809] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.475918] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.488496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 136.520943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 136.530816] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 136.540464] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 136.555581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.569796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.585192] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.599499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.606747] Bluetooth: hci0 command 0x0419 tx timeout [ 136.609094] Bluetooth: hci5 command 0x0419 tx timeout [ 136.614696] Bluetooth: hci1 command 0x0419 tx timeout [ 136.619994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.634269] Bluetooth: hci3 command 0x0419 tx timeout [ 136.636423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.641001] Bluetooth: hci2 command 0x0419 tx timeout [ 136.651153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.659625] Bluetooth: hci4 command 0x0419 tx timeout [ 136.665798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.680286] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 136.688683] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 136.695454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.706760] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.715905] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.726035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.735237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.745097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.754292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.764050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.773969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.783965] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.793992] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 136.801303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 136.820157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.834930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.844971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.860429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.871978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.882434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.892040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.901875] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.911246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.921009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.930765] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.940854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.951649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 136.958605] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 136.967913] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 136.976241] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.983361] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.991453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.005803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.020882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.032316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.042008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.051889] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.061119] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.071079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.080269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.090614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.101930] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 137.109484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 137.126993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.135792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.148869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 137.155991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.164725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.253147] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready 09:58:35 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000d00) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/netstat\x00') preadv(r3, &(0x7f00000017c0), 0x6d, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0xb8, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x98, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/)+@{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '),\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '&[^(^{$,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8b2}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '),@)#:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4048800}, 0x44841) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xcc, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xb8, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) [ 137.311838] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.334637] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.382945] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 137.395752] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 137.420227] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 09:58:35 executing program 3: r0 = socket(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x141, 0x0) [ 137.451185] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.462228] audit: type=1804 audit(1606211915.585:2): pid=9495 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir869300320/syzkaller.eEqfTD/1/cgroup.controllers" dev="sda1" ino=15744 res=1 [ 137.498484] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:58:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={&(0x7f0000003280)={0xa}, 0xc, &(0x7f0000003c40)={0x0}}, 0x0) [ 137.535183] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 137.547088] hrtimer: interrupt took 36640 ns [ 137.561324] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 137.568742] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.568749] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.605764] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.632388] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:58:35 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/32, 0x20) getdents(r0, 0x0, 0x0) [ 137.648587] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1844 [ 137.658209] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:58:35 executing program 3: r0 = socket(0x1e, 0x5, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000001340)={&(0x7f0000000000), 0xc, &(0x7f0000001300)={0x0}}, 0x0) [ 137.703791] in_atomic(): 0, irqs_disabled(): 0, pid: 5, name: kworker/u4:0 09:58:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/222, 0xde}, {&(0x7f0000002880)=""/178, 0xb2}, {&(0x7f0000002940)=""/145, 0x91}], 0x3}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000004c0)=""/152, 0x98}], 0x1}}, {{&(0x7f0000002f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003200)=""/190, 0xbe}], 0x10000000000001c6}, 0x6096}], 0x3, 0x0, 0x0) [ 137.770954] 4 locks held by kworker/u4:0/5: [ 137.801083] #0: ("%s"wiphy_name(local->hw.wiphy)){+.+.}, at: [] process_one_work+0x6b0/0x14a0 [ 137.834776] #1: ((&sdata->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 137.849855] #2: (&wdev->mtx){+.+.}, at: [] ieee80211_ibss_work+0x72/0xc90 [ 137.874003] #3: (rcu_read_lock){....}, at: [] sta_info_insert_rcu+0x48d/0x1f40 [ 137.888357] Preemption disabled at: [ 137.888377] [] rcu_lockdep_current_cpu_online+0x30/0x140 [ 137.899202] CPU: 0 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.208-syzkaller #0 [ 137.906579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.915944] Workqueue: phy8 ieee80211_iface_work [ 137.920694] Call Trace: [ 137.923277] dump_stack+0x1b2/0x283 [ 137.926911] ? rcu_lockdep_current_cpu_online+0x30/0x140 [ 137.932382] ___might_sleep.cold+0x235/0x250 [ 137.936814] sta_info_move_state+0x32/0x930 [ 137.941139] sta_info_free+0x50/0x330 [ 137.944961] sta_info_insert_rcu+0x23c/0x1f40 [ 137.949457] ? __local_bh_enable_ip+0xc1/0x170 [ 137.954042] ? minstrel_ht_rate_update+0x40/0x40 [ 137.958818] ? rate_control_rate_init+0x2cb/0x4f0 [ 137.963669] ieee80211_ibss_finish_sta+0x1db/0x2b0 [ 137.968600] ? ieee80211_sta_join_ibss+0xd50/0xd50 [ 137.973555] ? __local_bh_enable_ip+0xc1/0x170 [ 137.978173] ieee80211_ibss_work+0x260/0xc90 [ 137.982611] ? ieee80211_ibss_rx_queued_mgmt+0x1680/0x1680 [ 137.988237] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 137.993340] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 137.998378] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 138.003484] ieee80211_iface_work+0x690/0x770 [ 138.007986] process_one_work+0x793/0x14a0 [ 138.012241] ? work_busy+0x320/0x320 [ 138.015950] ? worker_thread+0x158/0xff0 [ 138.020013] ? _raw_spin_unlock_irq+0x24/0x80 [ 138.024530] worker_thread+0x5cc/0xff0 [ 138.028445] ? rescuer_thread+0xc80/0xc80 [ 138.032592] kthread+0x30d/0x420 [ 138.035957] ? kthread_create_on_node+0xd0/0xd0 [ 138.040628] ret_from_fork+0x24/0x30 [ 138.082012] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 138.161975] audit: type=1804 audit(1606211916.285:3): pid=9495 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir869300320/syzkaller.eEqfTD/1/cgroup.controllers" dev="sda1" ino=15744 res=1 [ 138.430285] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 138.461624] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 138.485986] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 138.493472] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 138.503712] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 138.522563] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 138.542915] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 138.584199] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 138.596952] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 138.605729] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 138.627487] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 138.635613] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 138.636402] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 138.653357] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 138.667592] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1844 [ 138.683442] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 138.694001] in_atomic(): 0, irqs_disabled(): 0, pid: 22, name: kworker/u4:1 [ 138.710176] 4 locks held by kworker/u4:1/22: [ 138.720339] #0: ("%s"wiphy_name(local->hw.wiphy)){+.+.}, at: [] process_one_work+0x6b0/0x14a0 [ 138.730930] #1: ((&sdata->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 138.740006] #2: (&wdev->mtx){+.+.}, at: [] ieee80211_ibss_work+0x72/0xc90 [ 138.749137] #3: (rcu_read_lock){....}, at: [] sta_info_insert_rcu+0x48d/0x1f40 [ 138.758396] Preemption disabled at: [ 138.758413] [] rcu_lockdep_current_cpu_online+0x30/0x140 [ 138.771987] CPU: 1 PID: 22 Comm: kworker/u4:1 Tainted: G W 4.14.208-syzkaller #0 [ 138.780696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.790100] Workqueue: phy12 ieee80211_iface_work [ 138.794948] Call Trace: [ 138.797542] dump_stack+0x1b2/0x283 [ 138.801177] ? rcu_lockdep_current_cpu_online+0x30/0x140 [ 138.806732] ___might_sleep.cold+0x235/0x250 [ 138.811146] sta_info_move_state+0x32/0x930 [ 138.815558] sta_info_free+0x50/0x330 [ 138.820057] sta_info_insert_rcu+0x23c/0x1f40 [ 138.824558] ? __local_bh_enable_ip+0xc1/0x170 [ 138.829150] ? minstrel_ht_rate_update+0x40/0x40 [ 138.833914] ? rate_control_rate_init+0x2cb/0x4f0 [ 138.838768] ieee80211_ibss_finish_sta+0x1db/0x2b0 [ 138.843725] ? ieee80211_sta_join_ibss+0xd50/0xd50 [ 138.848659] ? __local_bh_enable_ip+0xc1/0x170 [ 138.853248] ieee80211_ibss_work+0x260/0xc90 [ 138.857665] ? ieee80211_ibss_rx_queued_mgmt+0x1680/0x1680 [ 138.863299] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 138.868503] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 138.873562] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 138.878694] ieee80211_iface_work+0x690/0x770 [ 138.883228] process_one_work+0x793/0x14a0 [ 138.888270] ? work_busy+0x320/0x320 [ 138.892003] ? worker_thread+0x158/0xff0 [ 138.896052] ? _raw_spin_unlock_irq+0x24/0x80 [ 138.900563] worker_thread+0x5cc/0xff0 [ 138.905237] ? rescuer_thread+0xc80/0xc80 [ 138.909371] kthread+0x30d/0x420 [ 138.912723] ? kthread_create_on_node+0xd0/0xd0 [ 138.917391] ret_from_fork+0x24/0x30 [ 138.937421] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:58:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000002880)=""/178, 0xb2}, {&(0x7f0000002940)=""/145, 0x91}], 0x3}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000004c0)=""/152, 0x98}], 0x1}}, {{&(0x7f0000002f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003200)=""/190, 0xbe}], 0x1}, 0x6096}], 0x3, 0x0, 0x0) 09:58:37 executing program 5: r0 = socket(0x1e, 0x4, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x45) 09:58:37 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000d00) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/netstat\x00') preadv(r3, &(0x7f00000017c0), 0x6d, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0xb8, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x98, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/)+@{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '),\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '&[^(^{$,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8b2}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '),@)#:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4048800}, 0x44841) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xcc, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xb8, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 09:58:37 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000d00) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/netstat\x00') preadv(r3, &(0x7f00000017c0), 0x6d, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0xb8, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x98, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/)+@{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '),\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '&[^(^{$,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8b2}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '),@)#:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4048800}, 0x44841) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xcc, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xb8, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 09:58:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006d00)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000c9c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:37 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) 09:58:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$inet(r0, &(0x7f0000001a80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="a5144392e29eb3cf08cdbd95a482e59ea48cb30a2c2637dc0608da224752fa8533fe99599a028d5a2658e280bbba44e826bc7b531bdc18bd", 0x38}, {&(0x7f0000000140)="3f18ce56646ed62b2c3d16098d2b403e8e78321714188a8fceaaebd4df6f8e04214f7f62621d3789ed4afa223c31076076a6e9c61aefde10a786973b3c50b99a9ce5", 0x42}, {&(0x7f00000002c0)="349e60825559138f89dd7d66c106004abab2c929ddf448832e0c82f02d13f55fb18f803b9fc347e934b532711cb0b6c519732c4667c82f5302a43ab5ea293bcb9f3e4b2b781836fce1", 0x49}], 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x38}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000003c0)="f426ed1b625de994d7", 0x9}], 0x1}}], 0x2, 0x20008800) write$binfmt_misc(r0, 0x0, 0xfef0) 09:58:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={&(0x7f0000003280), 0x2000328c, &(0x7f0000003c40)={0x0}}, 0x0) [ 139.139999] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 139.165169] audit: type=1804 audit(1606211917.285:4): pid=9617 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir712071060/syzkaller.rQZr5H/1/cgroup.controllers" dev="sda1" ino=15778 res=1 09:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000009e40)={&(0x7f0000009440)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:58:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000009e80)={&(0x7f0000000080), 0xc, &(0x7f0000009e40)={&(0x7f0000009440)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:58:37 executing program 3: r0 = socket(0x1e, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) 09:58:37 executing program 4: r0 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x1, 0x0, 0x0) [ 139.331604] audit: type=1804 audit(1606211917.315:5): pid=9618 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir869300320/syzkaller.eEqfTD/2/cgroup.controllers" dev="sda1" ino=15780 res=1 09:58:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000003580)={&(0x7f0000000000), 0xc, &(0x7f0000003540)={0x0}}, 0x0) 09:58:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000000400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x60}}, 0x0) 09:58:38 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000004280)={0x0, 0x0, 0x0}, 0x0) 09:58:38 executing program 5: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5800) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x6000) 09:58:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006d00)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000c9c0)=[{{0xfffffffffffffffd, 0x0, &(0x7f0000006b00)=[{0x0}, {&(0x7f0000006580)=""/192, 0xc0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, &(0x7f000000ab00)={0x0, 0x989680}) 09:58:38 executing program 0: unlinkat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x200) 09:58:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000008080e2ff1800128008000100707070000c000280080001"], 0x38}}, 0x0) [ 140.040864] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 09:58:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006d00)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000c9c0)=[{{0xfffffffffffffffd, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, 0x0) [ 140.095973] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@ipv4_delrule={0x28, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0xee01}}]}, 0x28}}, 0x0) 09:58:38 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000012c0)={@multicast, @random="ea24cd4887bc", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @remote}, {0x0, 0x0, 0x8}}}}}, 0x0) 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x98, 0x180, 0x98, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ip={@broadcast, @empty, 0x0, 0x0, 'ip_vti0\x00', 'hsr0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 09:58:38 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 09:58:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c}, @echo}}}}, 0x0) 09:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="b4c9ea7e000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x48, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x0, 0x0, 0xffb, 0x7, 0x0, 0x40100000000000}}]}}}]}, 0x78}}, 0x0) 09:58:38 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5800) shmdt(r0) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 09:58:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000009e40)={&(0x7f0000009440)={0x10, r1, 0x1}, 0x14}}, 0x0) 09:58:38 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f00000000c0)=""/57, 0x39) getdents(r0, &(0x7f0000000100)=""/32, 0x20) 09:58:38 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000000), 0x1, 0x40000040, 0x0) 09:58:38 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000b900)={&(0x7f0000000000), 0xc, &(0x7f000000b8c0)={0x0}}, 0x2000c009) 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={0x0, 0x0, &(0x7f0000003c40)={0x0}}, 0x0) 09:58:39 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000280)={@multicast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "89c917", 0x44, 0x3a, 0x0, @local, @empty}}}}, 0x0) [ 140.833407] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 09:58:39 executing program 4: r0 = socket(0x1e, 0x5, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0, 0x24}}, 0x4040050) 09:58:39 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f00000000c0)=""/57, 0x39) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 09:58:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006d00)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000c9c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, &(0x7f000000ab00)={0x0, 0x989680}) 09:58:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={&(0x7f0000003280), 0xc, &(0x7f0000003c40)={0x0}}, 0x0) [ 140.927093] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 09:58:39 executing program 2: shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffc000/0x3000)=nil) 09:58:39 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000300)='/proc/tty/drivers\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x3000000, 0x0) 09:58:39 executing program 5: shmget$private(0x0, 0x1000, 0x1b61, &(0x7f0000ff9000/0x1000)=nil) 09:58:39 executing program 4: r0 = socket(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={&(0x7f00000017c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xd4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0xc0, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.@(\'-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'/:\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '([]-):\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.@/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xdb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xa9, 0x5, "93d5689ff38a5be943b5ffba58ffa2409a73bf75c834c30be9ccc73cf8786111e241a480e5991fcb70a01324e194ae711c5c8c4e3d5643ceeedcdbc1ef7831648ba789fb68e16e5c61ab4efec79c39799ef466270cbd7d5ccf7df48106e98411d1295860bb8688aaa421ad0239c54b24ddf5c6a753357bf682eee31b7df463239dfe0c3ead863a8adc6f62cfbfdfebed648a05d5ac0bc4f4ea90c4ed58ec67a5635c9e8cad"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'N)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xcd, 0x5, "41b7a0b46da28efcc2ffdece679c516c5fce2c96d779ae335cd7dfb9fdde2d08a5f03499813d89b26ba645b270b15aad095c95bd639c8d11f2a4007c1069b73685f6f229b59532b1e25c38dac17c3fc96c4d43bfc42083138447bd531430ea1077ef1ed0990214cff83c1fa7571ee651d386211e1b6bfa3f90790400747f403e72873a6bec1e76966fc4207c9f76dea4562ff789cf305288918da78f1222fc4027b7b6d67ebca2a1c6941ac59fb69416b685e64d58f56f5da92219a51a8070e010a9814b2729e6af17"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xbd, 0x4, "3811f0a2e065e43d149443072d383a228fe2ed8a9c8c9c191ce6a5a8a5914a6b291d94cd7672e3dd12364f7204aacf387f023a38f93e8cdede418f5cb645f6155b6d8d454a382654a36547b17a0cfd43414a39c121a271037045e4bef46b803fb125fe4555b14bce6d7e24c9816e8559d92f9d78dd224bf9da06dc8b488105d2c4063ecd8932999c56ba8a9a02920f60ee4636358579bb919a7258ff3ff663bf1ef703bbe1d1bddab8fa93df9c773b7834127fed8586516a96"}, @ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '//+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')$}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%\x9d\x06@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ')+\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ':\xb8#[\x90\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x9f1, 0x4, "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"}]}]}, 0xec4}}, 0x0) 09:58:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006d00)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000c9c0)=[{{0xfffffffffffffffd, 0x0, &(0x7f0000006b00)=[{&(0x7f0000006540)=""/11, 0xb}, {&(0x7f0000006580)=""/192, 0xc0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, &(0x7f000000ab00)={0x0, 0x989680}) 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setuid(0xee01) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 09:58:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}]}, 0x3c}}, 0x0) 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={&(0x7f0000003280)={0x2}, 0xc, &(0x7f0000003c40)={0x0}}, 0x0) 09:58:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000009e80)={0x0, 0x0, &(0x7f0000009e40)={&(0x7f0000009440)={0x14, r1, 0x1, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 09:58:39 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+10000000}, {0x0, r1+60000000}}, 0x0) timer_gettime(0x0, &(0x7f0000000200)) 09:58:39 executing program 5: r0 = socket(0x1e, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1}, 0x0) 09:58:39 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f00000014c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000000)=[{&(0x7f00000000c0)='p', 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400402000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000dc0)={0x0, 0x0, 0x0}, 0x0) 09:58:39 executing program 0: socket(0x1e, 0x4, 0x0) 09:58:39 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {}, 0x88549970197682cf, {0x2, 0x0, @multicast1}}) [ 141.223275] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 09:58:40 executing program 4: 09:58:40 executing program 2: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5800) shmdt(r0) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 09:58:40 executing program 1: r0 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/12, 0xc}, {&(0x7f0000000500)=""/103, 0xfffffffffffffead}, {&(0x7f0000000080)=""/230, 0xe6}, {&(0x7f0000000580)=""/253, 0xfd}, {&(0x7f00000001c0)=""/222, 0xde}], 0x5}}], 0x1, 0x0, 0x0) 09:58:40 executing program 0: r0 = socket(0x1e, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000001d00)=""/201, 0xc9}], 0x1}}], 0x1, 0x0, 0x0) 09:58:40 executing program 5: 09:58:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x7fff}) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x40001}) 09:58:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000003c80)={0x0, 0x0, &(0x7f0000003c40)={0x0}}, 0xf0ff7f) 09:58:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000004fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x81, 0x0) 09:58:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @loopback}, @xdp, @isdn, 0x7}) 09:58:40 executing program 3: 09:58:40 executing program 4: 09:58:40 executing program 5: 09:58:40 executing program 1: 09:58:40 executing program 2: 09:58:40 executing program 1: 09:58:40 executing program 0: 09:58:40 executing program 3: r0 = socket(0x1e, 0x4, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000380)={0x0}}, 0x45) 09:58:40 executing program 2: 09:58:40 executing program 5: 09:58:40 executing program 4: 09:58:40 executing program 1: 09:58:40 executing program 2: 09:58:40 executing program 1: 09:58:40 executing program 0: 09:58:40 executing program 5: 09:58:40 executing program 4: 09:58:40 executing program 1: 09:58:40 executing program 3: 09:58:40 executing program 2: 09:58:40 executing program 4: 09:58:40 executing program 5: 09:58:40 executing program 0: 09:58:41 executing program 3: 09:58:41 executing program 1: 09:58:41 executing program 2: 09:58:41 executing program 4: 09:58:41 executing program 5: 09:58:41 executing program 0: 09:58:41 executing program 3: 09:58:41 executing program 1: 09:58:41 executing program 2: 09:58:41 executing program 5: 09:58:41 executing program 4: 09:58:41 executing program 2: 09:58:41 executing program 0: 09:58:41 executing program 3: 09:58:41 executing program 5: 09:58:41 executing program 1: 09:58:41 executing program 4: 09:58:41 executing program 2: 09:58:41 executing program 5: 09:58:41 executing program 1: 09:58:41 executing program 3: 09:58:41 executing program 0: 09:58:41 executing program 2: 09:58:41 executing program 4: 09:58:41 executing program 1: 09:58:41 executing program 5: 09:58:41 executing program 0: 09:58:41 executing program 3: 09:58:41 executing program 2: 09:58:41 executing program 4: 09:58:41 executing program 1: 09:58:41 executing program 5: 09:58:41 executing program 0: 09:58:41 executing program 3: 09:58:41 executing program 2: 09:58:41 executing program 5: 09:58:41 executing program 4: 09:58:41 executing program 1: 09:58:41 executing program 0: 09:58:41 executing program 2: 09:58:41 executing program 3: 09:58:41 executing program 5: 09:58:41 executing program 1: 09:58:41 executing program 0: 09:58:41 executing program 2: 09:58:41 executing program 4: 09:58:41 executing program 3: 09:58:41 executing program 4: 09:58:41 executing program 3: 09:58:41 executing program 0: 09:58:41 executing program 5: 09:58:41 executing program 2: 09:58:41 executing program 1: 09:58:41 executing program 2: 09:58:41 executing program 4: 09:58:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @ipv4={[], [], @broadcast}, @empty, 0x700}}) 09:58:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x20000070, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:58:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x31, 0x0, &(0x7f0000000040)) 09:58:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd77, 0x0, &(0x7f0000000040)) 09:58:41 executing program 4: 09:58:41 executing program 3: 09:58:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x34, 0x0, 0x0, 0xfffffeff}]}) 09:58:41 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:58:41 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB='#! '], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x12, 0x0, &(0x7f0000000040)) 09:58:41 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0x13f) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40c1) 09:58:41 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="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", 0x1c0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 09:58:41 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB='#! '], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 143.761705] ptrace attach of "/root/syz-executor.4"[9961] was attempted by "/root/syz-executor.4"[9965] 09:58:42 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB='#! '], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 09:58:42 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcd", 0x13f) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 1: socketpair(0xa, 0x3, 0x80, &(0x7f0000000000)) [ 143.879419] ptrace attach of "/root/syz-executor.4"[9983] was attempted by "/root/syz-executor.4"[9987] [ 143.881535] ptrace attach of "/root/syz-executor.2"[9972] was attempted by "/root/syz-executor.2"[9981] 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="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", 0x1c0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd7d, 0x0, &(0x7f0000000040)) 09:58:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @empty}}) 09:58:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8918, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, &(0x7f0000000040)) [ 143.988413] ptrace attach of "/root/syz-executor.3"[9998] was attempted by "/root/syz-executor.3"[10002] 09:58:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd7c, 0x0, &(0x7f0000000040)) 09:58:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x0, 0x700}}) 09:58:42 executing program 3: [ 144.083041] ptrace attach of "/root/syz-executor.0"[9994] was attempted by "/root/syz-executor.0"[10005] 09:58:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f000000a340)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1}}) 09:58:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x28}]}) 09:58:42 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="b4c9ea7e000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x70, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {0x4}}]}]}, 0x70}}, 0x0) 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="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", 0x1c0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) [ 144.124462] ptrace attach of "/root/syz-executor.2"[10006] was attempted by "/root/syz-executor.2"[10011] 09:58:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x18, r1, 0x1103, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}}, 0x0) 09:58:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd78, 0x0, &(0x7f0000000040)) 09:58:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x34}]}) 09:58:42 executing program 0: socketpair(0xa, 0x0, 0x107, &(0x7f0000000000)) [ 144.220796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27f", 0x1c0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x3, 0x0, 0x0, 0xfffffeff}]}) 09:58:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1b, 0x80000001, 0x0, 0x0, 0x0, 0x1}, 0x40) 09:58:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000050, 0x0) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50}, 0x50) syz_open_dev$vcsn(0x0, 0x0, 0x109002) [ 144.273839] ptrace attach of "/root/syz-executor.2"[10033] was attempted by "/root/syz-executor.2"[10037] [ 144.309951] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 09:58:42 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27fbc06b5642473a41a6cbfb07f53deab2473b37c3d10a125d610f1b9ea5c83e7d462048f25fc1e79295eeff750a23faf5d542758c421bb0673504c9dbae2959f77", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 144.359363] ptrace attach of "/root/syz-executor.2"[10052] was attempted by "/root/syz-executor.2"[10055] 09:58:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x541b, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8936, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x18}, 0x40) 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27f", 0x1c0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x20, r1, 0x1103, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x3}]}]}, 0x20}}, 0x0) 09:58:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 144.493571] ptrace attach of "/root/syz-executor.5"[10062] was attempted by "/root/syz-executor.5"[10063] 09:58:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)="8907040400", 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='macvlan1\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) close(r0) 09:58:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000050, 0x0) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50}, 0x50) syz_open_dev$vcsn(0x0, 0x0, 0x109002) 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) write(r2, &(0x7f0000004200)="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", 0x1c0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27fbc06b5642473a41a6cbfb07f53deab2473b37c3d10a125d610f1b9ea5c83e7d462048f25fc1e79295eeff750a23faf5d542758c421bb0673504c9dbae2959f77", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 144.590868] ptrace attach of "/root/syz-executor.2"[10075] was attempted by "/root/syz-executor.2"[10079] 09:58:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0xc0189436, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x22, 0x0, &(0x7f0000000040)) 09:58:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8910, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000003800)={0x0}}, 0x0) 09:58:42 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000180)={0x0, 0x0}) 09:58:42 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)="8907040400", 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='macvlan1\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 09:58:42 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0xce40, 0x0) 09:58:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x14, r1, 0x1103, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x17, 0x0, 0x6, 0xffffffff}, 0x40) 09:58:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x28, r1, 0x1103, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x28}}, 0x0) 09:58:43 executing program 5: bpf$BPF_LINK_UPDATE(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x7eb7138b6badfd90}, 0x10) 09:58:43 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d009d331b48b925ffe6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d611b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27fbc06b5642473a41a6cbfb07f53deab2473b37c3d10a125d610f1b9ea5c83e7d462048f25fc1e79295eeff750a23faf5d542758c421bb0673504c9dbae2959f77", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, &(0x7f0000000040)) 09:58:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd7b, 0x0, &(0x7f0000000040)) 09:58:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89b1, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) 09:58:43 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 09:58:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000005280)={0x0, 0x0, &(0x7f0000005240)={&(0x7f0000005080)={0x14, r1, 0x301}, 0x14}}, 0x0) 09:58:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c80)={'sit0\x00', &(0x7f0000000c00)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @private1}}) 09:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getnexthop={0x24, 0x6a, 0x121, 0x0, 0x0, {}, [@NHA_MASTER={0x3}, @NHA_GROUPS={0x4}]}, 0x24}}, 0x0) 09:58:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000140, 0x0) 09:58:43 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x52) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000003840)={&(0x7f0000000300), 0xc, &(0x7f0000003800)={&(0x7f0000001dc0)={0x14}, 0x14}}, 0x40) 09:58:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000005280)={0x0, 0x0, &(0x7f0000005240)={&(0x7f0000005080)={0x20, r1, 0x301, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 09:58:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:58:43 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x17, 0x0, 0x0, 0xffffffff}, 0x40) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) write(0xffffffffffffffff, &(0x7f0000004200)="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", 0xffe00) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 1: mq_open(&(0x7f0000000040)='D\x9c\x98\xf2\x8a\xd0\x7f=Eh\x84 \xee\xbc\xfe\xbf\xf4\x01\x9bD\x8e\x0e`\xf5}.x\x98\xd9_\x16|\xb6\xde\xcb!ATE{\x9e\x8e\xf8\x80\xe1\xaa\xaf,\xf42\x98\x92\x15\x16BM!<\x93\x12\x05\xa7\xd3\x01T#\xd8\xb4\x1e\xaf\x8aw\x80p\xf2s\x99\x82\xe0$U\xca2\xba\b\xe4\xe6R\xf1\xe3\xe3\x89\x18G4N\x84>\xf6\xe8S\xc0\x95\xca\'\xb6\xc1\xd1B=\xc6\xfc\xea\xef\x1e\x9d\xbeC\x92h\xb5\xc9\xf5\xe6\xc7\x01\xf8\x80y\x94|\xb7r\xf7X\xf6\x83\xb6f\xe1\x8dk\xbf\xac\xd2\xa0:\xaf\xa4\xb3e\xff\xf8\xbc\x82\xb17\xc4Sj\xbcz\xed\xc2\x14f\xfc\x10', 0x0, 0x0, 0x0) 09:58:43 executing program 5: r0 = mq_open(&(0x7f00000000c0)='{#,,\x00', 0x0, 0x0, 0x0) mq_notify(r0, 0x0) 09:58:43 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e2f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000000ac78aee630b40d9ae2efa3163fd2529010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f", 0xf, 0x1000}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012500)="ed41000000100000e2f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000000440)=ANY=[]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000180)=0x8000000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x2, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f22713f08dc", 0xffffff30}], 0x1, 0x7300, 0x20) 09:58:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) chroot(&(0x7f0000000380)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) 09:58:43 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x20, r1, 0x1103, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xed35}]}]}, 0x20}}, 0x0) 09:58:43 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x14, r1, 0x1103}, 0x14}}, 0x0) 09:58:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) chroot(&(0x7f0000000380)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) 09:58:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f0000000040)) 09:58:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x890c, &(0x7f000000a340)={'ip6gre0\x00', 0x0}) [ 145.864950] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:58:44 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) chroot(&(0x7f0000000380)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) 09:58:44 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:44 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e2f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000000ac78aee630b40d9ae2efa3163fd2529010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f", 0xf, 0x1000}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012500)="ed41000000100000e2f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000000440)=ANY=[]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000180)=0x8000000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x2, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f22713f08dc", 0xffffff30}], 0x1, 0x7300, 0x20) 09:58:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002a80)={0x14, r1, 0x1103, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 09:58:44 executing program 1: waitid(0x3, 0x0, 0x0, 0x4, 0x0) 09:58:44 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65302080"], 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:58:44 executing program 4: openat$procfs(0xffffff9c, &(0x7f0000000300)='/proc/tty/drivers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 09:58:44 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xd931d3864d39dcd7) write$binfmt_script(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c653020806f0600"], 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) tkill(r0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 146.612967] syz-executor.0 (10227) used greatest stack depth: 24184 bytes left 09:58:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x4d}]}) 0